多选题What are two purposes of a forwarding class?()Ato identify traffic that should be droppedBto classify trafficCto identify traffic that should receive common treatmentDto assign traffic to output queues

题目
多选题
What are two purposes of a forwarding class?()
A

to identify traffic that should be dropped

B

to classify traffic

C

to identify traffic that should receive common treatment

D

to assign traffic to output queues


相似考题
参考答案和解析
正确答案: A,C
解析: 暂无解析
更多“多选题What are two purposes of a forwarding class?()Ato identify traffic that should be droppedBto classify trafficCto identify traffic that should receive common treatmentDto assign traffic to output queues”相关问题
  • 第1题:

    What are two step needed to define a QoS policy for a traffic class?()

    • A、determine a minimum bandwidth guarantee
    • B、determine interfaces to which to apply policy
    • C、assign priorities to the class
    • D、configure access control lists

    正确答案:A,C

  • 第2题:

    Which two statements correctly identify factors to consider when Configuring WAN QoS?()

    • A、Voice Traffic uses Assured Forwarding
    • B、Voice Signaling traffic uses Assured Forwarding
    • C、Voice Signaling traffic uses priority queuing
    • D、Voice Traffic uses priority queuing
    • E、Voice signaling traffic should use priority queuing with Assured Forwarding

    正确答案:B,D

  • 第3题:

    What are two functions associated with JUNOS software class of service?()

    • A、Log incoming traffic.
    • B、Manage ingress bandwidth.
    • C、Mark packets for special handling.
    • D、Manage congestion by intelligently dropping traffic.
    • E、Classify Frame Relay QoS packets into an equivalent OP CoS environment.

    正确答案:C,D

  • 第4题:

    What are the contents of a scheduler?()

    • A、A scheduler contains parameters that describe how a queue should be serviced.
    • B、A scheduler contains traffic that is ready to be transmitted.
    • C、A scheduler contains forwarding classes that allow traffic to be forwarded.
    • D、A scheduler contains a map between the classification of a packet and its forwarding class.

    正确答案:A

  • 第5题:

    What are two purposes of a forwarding class?()

    • A、to rewrite the ToS bits in the IP header
    • B、to classify traffic
    • C、to identify traffic that should receive commom treatment
    • D、to assign traffic to output queues

    正确答案:C,D

  • 第6题:

    You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()

    • A、VPN Traffic
    • B、DNS Traffic
    • C、LDAP Traffic
    • D、HTTP Traffic
    • E、HTTPS Traffic
    • F、Traffic from the network address of 192.168.10/24

    正确答案:A,C,D,E

  • 第7题:

    多选题
    What are two purposes of a forwarding class?()
    A

    to identify traffic that should be dropped

    B

    to classify traffic

    C

    to identify traffic that should receive common treatment

    D

    to assign traffic to output queues


    正确答案: A,B
    解析: 暂无解析

  • 第8题:

    多选题
    You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
    A

    VPN Traffic

    B

    DNS Traffic

    C

    LDAP Traffic

    D

    HTTP Traffic

    E

    HTTPS Traffic

    F

    Traffic from the network address of 192.168.10/24


    正确答案: D,F
    解析: 暂无解析

  • 第9题:

    多选题
    What are two purposes of a forwarding class?()
    A

    to rewrite the ToS bits in the IP header

    B

    to classify traffic

    C

    to identify traffic that should receive commom treatment

    D

    to assign traffic to output queues


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    What are two functions of the RE?()
    A

    to maintain routing tables

    B

    to forward traffic toward its destination

    C

    to manage the PFE

    D

    to implement various services such as policing, stateless firewall filtering, and class of service


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    What are two reasons that a network administrator would use access lists (Choose two.)()。
    A

    to control vty access into a router

    B

    to control broadcast traffic through a router

    C

    to filter traffic as it passes through a router

    D

    to filter traffic that originates from the router

    E

    to replace passwords as a line of defense against security incursions


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    单选题
    What is the purpose of unicast reverse path forwarding?()
    A

    to validate packet receipt on interfaces where the traffic should be received

    B

    to forward packets out the interfaces where the traffic should be received

    C

    to forward packets out the interfaces where the traffic should be sent

    D

    to validate packet receipt on interfaces where the traffic should be sent


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which two statements are true about trust boundaries?()

    • A、Classifying and marking traffic should be done as close to the traffic source as possible. 
    • B、Classifying and marking traffic should be done at the distribution layer.
    • C、Traffic is classified and marked as it travels through the network.
    • D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
    • E、The trust boundary moves depending on the type of traffic entering the network.

    正确答案:A,D

  • 第14题:

    A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()

    • A、Block both IRC and ICMP
    • B、Utilize SNMP to identify IM users
    • C、Contact the IM carrier to request the IM account be disabled
    • D、Change the shaping setting to allow minimal traffic to reduce port hopping

    正确答案:D

  • 第15题:

    What is the purpose of unicast reverse path forwarding?()

    • A、to validate packet receipt on interfaces where the traffic should be received
    • B、to forward packets out the interfaces where the traffic should be received
    • C、to forward packets out the interfaces where the traffic should be sent
    • D、to validate packet receipt on interfaces where the traffic should be sent

    正确答案:A

  • 第16题:

    What are three functions associated with JUNOS software class of service?()

    • A、Log incoming traffic.
    • B、Classify incoming packets.
    • C、Manage outbound bandwidth.
    • D、Manage congestion by intelligently dropping traffic.
    • E、Classify ATM QoS packets into an equivalent IP CoS environment.

    正确答案:B,C,D

  • 第17题:

    What are two purposes of a forwarding class?()

    • A、to identify traffic that should be dropped
    • B、to classify traffic
    • C、to identify traffic that should receive common treatment
    • D、to assign traffic to output queues

    正确答案:C,D

  • 第18题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第19题:

    多选题
    Which two statements are true about traffic shaping and traffic policing?()
    A

    both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP

    B

    both traffic shaping and traffic policing support the marking and re-marking of traffic

    C

    the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic

    D

    traffic shaping queues excess traffic whereas traffic policing discards excess traffic

    E

    traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate


    正确答案: C,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about trust boundaries?()
    A

    Classifying and marking traffic should be done as close to the traffic source as possible.

    B

    Classifying and marking traffic should be done at the distribution layer.

    C

    Traffic is classified and marked as it travels through the network.

    D

    If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.

    E

    The trust boundary moves depending on the type of traffic entering the network.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    多选题
    What are some general guidelines regarding the placement of access control lists?()
    A

    You should place standard ACLS as close as possible to the source of traffic to be denied.

    B

    You should place extended ACLS as close as possible to the source of traffic to be denied.

    C

    You should place standard ACLS as close as possible to the destination of traffic to be denied.

    D

    You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements correctly identify factors to consider when Configuring WAN QoS?()
    A

    Voice Traffic uses Assured Forwarding

    B

    Voice Signaling traffic uses Assured Forwarding

    C

    Voice Signaling traffic uses priority queuing

    D

    Voice Traffic uses priority queuing

    E

    Voice signaling traffic should use priority queuing with Assured Forwarding


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following is the BEST reason to implement a firewall on a server?()
    A

    To watch for bandwidth issues

    B

    To protect the server from all traffic

    C

    To block certain traffic by ports

    D

    To monitor certain malicious traffic


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    What are the contents of a scheduler?()
    A

    A scheduler contains parameters that describe how a queue should be serviced.

    B

    A scheduler contains traffic that is ready to be transmitted.

    C

    A scheduler contains forwarding classes that allow traffic to be forwarded.

    D

    A scheduler contains a map between the classification of a packet and its forwarding class.


    正确答案: A
    解析: 暂无解析